# https://syzkaller.appspot.com/bug?id=65f3caae39807b0b41f8e62dec2a517a7e510651 # See https://goo.gl/kgGztJ for information about syzkaller reproducers. #{"threaded":true,"repeat":true,"procs":6,"slowdown":1,"sandbox":"none","sandbox_arg":0,"tun":true,"netdev":true,"resetnet":true,"cgroups":true,"binfmt_misc":true,"close_fds":true,"usb":true,"vhci":true,"wifi":true,"ieee802154":true,"sysctl":true,"tmpdir":true,"segv":true} syz_mount_image$hfsplus(&(0x7f0000000600), &(0x7f0000000200)='./file2\x00', 0x1010854, &(0x7f0000000040)=ANY=[], 0x1, 0x635, &(0x7f0000000c80)="$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") r0 = open(&(0x7f0000002000)='./bus\x00', 0x143042, 0x0) ftruncate(r0, 0x2007ffb) creat(0x0, 0x112) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, &(0x7f0000000640)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) openat$fb0(0xffffffffffffff9c, &(0x7f00000001c0), 0x101100, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', 0x141842, 0x0) openat$damon_kdamond_pid(0xffffffffffffff9c, &(0x7f0000000340), 0x181000, 0x4a) creat(&(0x7f0000000500)='./file1\x00', 0x1a3)